Microsoft 365 Defender Hunting via PowerShell.
☆14Feb 8, 2022Updated 4 years ago
Alternatives and similar repositories for gundog2
Users that are interested in gundog2 are comparing it to the libraries listed below
Sorting:
- MalwareAnalysis☆12Dec 19, 2020Updated 5 years ago
- Cyber Threats Detection Rules☆14Sep 16, 2025Updated 5 months ago
- Recent cyber attacks reports & interesting analysis files☆15Apr 14, 2022Updated 3 years ago
- Sharing presentation slides and workbook templates that can be useful to others to learn more about Azure Active Directory!☆21Aug 23, 2024Updated last year
- Powershell scripts to implement a Tier administration model in Active Directory☆31Sep 22, 2020Updated 5 years ago
- Forcepoint Security Management Center python library:(Moved to official Forcepoint repo)☆29Apr 6, 2021Updated 4 years ago
- Community content for LogRhythm Axon. Includes Dashboards, searches, analytics rules, processing policies and more.☆10Jul 26, 2024Updated last year
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Simulates a compromise in a cloud and container environment☆34Dec 18, 2024Updated last year
- Azure AD Identity Protection Cookie Spoofing☆36Sep 2, 2023Updated 2 years ago
- This repository aims to collect and document indicators from the different C2's listed in the C2-Matrix☆74Jan 26, 2022Updated 4 years ago
- Python script to walk a folder or a zip file for SQLite Databases☆37Sep 20, 2023Updated 2 years ago
- ☆13Nov 7, 2024Updated last year
- All slides from my meetup talks☆37Updated this week
- ☆14Dec 11, 2025Updated 2 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- One-off scripts that I have written involving PInvoke and PowerShell☆41Aug 2, 2016Updated 9 years ago
- Automation around Entra ID☆38Jul 21, 2025Updated 7 months ago
- A Python based ingestor for BloodHound☆85Sep 26, 2022Updated 3 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Research into Undocumented Behavior of Azure AD Refresh Tokens☆13Oct 27, 2023Updated 2 years ago
- This is a backup/test setup for the /r/ActiveDirectory reddit wiki and resource posts.☆19Nov 15, 2025Updated 3 months ago
- Threat Network Detection in Online Social Networks☆10Jan 20, 2017Updated 9 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- Project that creates a Kubernetes environment in Azure (AKS) and protects it with CloudGuard CSPM / Workload and Appsec technologies☆10Jun 12, 2023Updated 2 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- Tools related to work with Attack Flow (https://github.com/center-for-threat-informed-defense/attack-flow)☆44Jun 6, 2022Updated 3 years ago
- ☆44Jul 11, 2025Updated 7 months ago
- Library of threat hunts to get any user started!☆50Sep 4, 2020Updated 5 years ago
- ☆43Apr 18, 2023Updated 2 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- ☆13May 30, 2025Updated 9 months ago
- PowerShell scripts to facilitate Cross-Tenant migrations!☆12Aug 10, 2023Updated 2 years ago
- Tool to convert SDDL to readable text☆43Apr 25, 2018Updated 7 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Offensive toolkit and BloodHound graph creator for DPAPI blobs and master key files☆14Jan 10, 2026Updated last month